Pass the ECCouncil CHFI v10 312-49v10 Questions and answers with CertsForce

Viewing page 11 out of 15 pages
Viewing questions 151-165 out of questions
Questions # 151:

Where are files temporarily written in Unix when printing?

Options:

A.

/usr/spool


B.

/var/print


C.

/spool


D.

/var/spool


Expert Solution
Questions # 152:

To check for POP3 traffic using Ethereal, what port should an investigator search by?

Options:

A.

143


B.

25


C.

110


D.

125


Expert Solution
Questions # 153:

What is the smallest physical storage unit on a hard drive?

Options:

A.

Track


B.

Cluster


C.

Sector


D.

Platter


Expert Solution
Questions # 154:

When should an MD5 hash check be performed when processing evidence?

Options:

A.

After the evidence examination has been completed


B.

On an hourly basis during the evidence examination


C.

Before and after evidence examination


D.

Before the evidence examination has been completed


Expert Solution
Questions # 155:

Which of the following tasks DOES NOT come under the investigation phase of a cybercrime forensics investigation case?

Options:

A.

Data collection


B.

Secure the evidence


C.

First response


D.

Data analysis


Expert Solution
Questions # 156:

Bob has encountered a system crash and has lost vital data stored on the hard drive of his Windows computer. He has no cloud storage or backup hard drives. he wants to recover all those data, which includes his personal photos, music, documents, videos, official email, etc. Which of the following tools shall resolve Bob’s purpose?

Options:

A.

Colasoft’s Capsa


B.

Recuva


C.

Cain & Abel


D.

Xplico


Expert Solution
Questions # 157:

What advantage does the tool Evidor have over the built-in Windows search?

Options:

A.

It can find deleted files even after they have been physically removed


B.

It can find bad sectors on the hard drive


C.

It can search slack space


D.

It can find files hidden within ADS


Expert Solution
Questions # 158:

Using Linux to carry out a forensics investigation, what would the following command accomplish?

dd if=/usr/home/partition.image of=/dev/sdb2 bs=4096 conv=notrunc,noerror

Options:

A.

Search for disk errors within an image file


B.

Backup a disk to an image file


C.

Copy a partition to an image file


D.

Restore a disk from an image file


Expert Solution
Questions # 159:

Julie is a college student majoring in Information Systems and Computer Science. She is currently writing an essay for her computer crimes class. Julie paper focuses on white-collar crimes in America and how forensics investigators investigate the cases. Julie would like to focus the subject. Julie would like to focus the subject of the essay on the most common type of crime found in corporate America. What crime should Julie focus on?

Options:

A.

Physical theft


B.

Copyright infringement


C.

Industrial espionage


D.

Denial of Service attacks


Expert Solution
Questions # 160:

Lance wants to place a honeypot on his network. Which of the following would be your recommendations?

Options:

A.

Use a system that has a dynamic addressing on the network


B.

Use a system that is not directly interacting with the router


C.

Use it on a system in an external DMZ in front of the firewall


D.

It doesn't matter as all replies are faked


Expert Solution
Questions # 161:

Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

Options:

A.

Linux/Unix computers are easier to compromise


B.

Linux/Unix computers are constantly talking


C.

Windows computers are constantly talking


D.

Windows computers will not respond to idle scans


Expert Solution
Questions # 162:

You have been asked to investigate the possibility of computer fraud in the finance department of a company. It is suspected that a staff member has been committing finance fraud by printing cheques that have not been authorized. You have exhaustively searched all data files on a bitmap image of the target computer, but have found no evidence. You suspect the files may not have been saved. What should you examine next in this case?

Options:

A.

The registry


B.

The swap file


C.

The recycle bin


D.

The metadata


Expert Solution
Questions # 163:

The police believe that Melvin Matthew has been obtaining unauthorized access to computers belonging to numerous computer software and computer operating systems manufacturers, cellular telephone manufacturers, Internet Service Providers and Educational Institutions. They also suspect that he has been stealing, copying and misappropriating proprietary computer software belonging to the several victim companies. What is preventing the police from breaking down the suspects door and searching his home and seizing all of his computer equipment if they have not yet obtained a warrant?

Options:

A.

The Fourth Amendment


B.

The USA patriot Act


C.

The Good Samaritan Laws


D.

The Federal Rules of Evidence


Expert Solution
Questions # 164:

You are conducting an investigation of fraudulent claims in an insurance company that involves complex text searches through large numbers of documents. Which of the following tools would allow you to quickly and efficiently search for a string within a file on the bitmap image of the target computer?

Options:

A.

Stringsearch


B.

grep


C.

dir


D.

vim


Expert Solution
Questions # 165:

Jonathan is a network administrator who is currently testing the internal security of his network. He is attempting to hijack a session, using Ettercap, of a user connected to his Web server. Why will Jonathan not succeed?

Options:

A.

Only an HTTPS session can be hijacked


B.

HTTP protocol does not maintain session


C.

Only FTP traffic can be hijacked


D.

Only DNS traffic can be hijacked


Expert Solution
Viewing page 11 out of 15 pages
Viewing questions 151-165 out of questions